: End-to-End Hybrid Authenticated Key Exchanges

S Bruckner, S Ramacher, C Striecks - International Conference on Post …, 2023 - Springer
End-to-end authenticity in public networks plays a significant role. Namely, without
authenticity, the adversary might be able to retrieve even confidential information straight …

Reliable broadcast in radio networks: The bounded collision case

CY Koo, V Bhandari, J Katz, NH Vaidya - … of the twenty-fifth annual ACM …, 2006 - dl.acm.org
We study the problem of achieving global broadcast in a radio network where a node can
multicast messages to all of its neighbors (that is, nodes within some given distance r), and …

Perfectly secure message transmission revisited

Y Wang, Y Desmedt - IEEE Transactions on Information Theory, 2008 - ieeexplore.ieee.org
Secure communications guaranteeing reliability and privacy (without unproven
assumptions) in networks with active adversaries has been an important research issue. It …

[PDF][PDF] Services-oriented dynamic reconfiguration framework for dependable distributed computing

WT Tsai, W Song, R Paul, Z Cao, H Huang - COMPSAC, 2004 - Citeseer
Web services (WS) received significant attention recently because services can be
searched, bound, and executed at runtime over the Internet. This paper proposes a dynamic …

Reliable broadcast with respect to topology knowledge

A Pagourtzis, G Panagiotakos, D Sakavalas - Distributed Computing, 2017 - Springer
Abstract We study the Reliable Broadcast problem in incomplete networks against a
Byzantine adversary. We examine the problem under the locally bounded adversary model …

Must the communication graph of MPC protocols be an expander?

E Boyle, R Cohen, D Data, P Hubáček - Journal of Cryptology, 2023 - Springer
Secure multiparty computation (MPC) on incomplete communication networks has been
studied within two primary models:(1) where a partial network is fixed a priori, and thus …

Unconditionally reliable and secure message transmission in undirected synchronous networks: Possibility, feasibility and optimality

A Patra, A Choudhury… - … Journal of Applied …, 2010 - inderscienceonline.com
We study the interplay of network connectivity and the issues related to the'possibility','
feasibility'and'optimality'for unconditionally reliable message transmission (URMT) and …

Truly Efficient -Round Perfectly Secure Message Transmission Scheme

K Kurosawa, K Suzuki - IEEE Transactions on Information …, 2009 - ieeexplore.ieee.org
In the model of perfectly secure message transmission (PSMT) schemes, there are n
channels between a sender and a receiver. An infinitely powerful adversary A may corrupt …

Truly efficient 2-round perfectly secure message transmission scheme

K Kurosawa, K Suzuki - Advances in Cryptology–EUROCRYPT 2008: 27th …, 2008 - Springer
In the model of perfectly secure message transmission schemes (PSMTs), there are n
channels between a sender and a receiver. An infinitely powerful adversary may corrupt …

Numerical computation of multi-goal security strategies

S Rass, B Rainer - Decision and Game Theory for Security: 5th …, 2014 - Springer
Security is often investigated in terms of a single goal (eg, confidentiality), but in practical
settings mostly a compound property comprising multiple and often interdependent aspects …